Most of us know Cloud Computing as a recent technology, but to be technical, Cloud Computing is not a technology – it is a Business Model. Cloud Computing provides an on-demand network access to a shared pool of resources which can be rapidly provisioned.

Services are provided in three major categories.
IaaS
SaaS
PaaS

Why IBM BLUEMIX?
Bluemix simplifies delivery of an application. It provides a set of prebuilt services ready for immediate use.

BLUEMIX for Students A Website with no infrastructure provides many recent technologies and platform to work with them easily.
Students can host their small web pages on cloud – this will be accessible everywhere.
Provides analytics support for applications.
Provides support for Internet of Things [IoT] and Big data.
Bluemix keeps updating every now and then, by which many recent tools can be learnt.

- Mr. M. Sam Kirubaharan, Final Year/CSE

Twilio

Twilio was found by Jeff Lawson and team in 2008 in USA. Twilio uses Amazon web service to host its phone number in cloud. Twilio is cloud based communication platform that allows developers to use video, voice calls and text messages using API's.Developers can buy a phone number from cloud and use it in their applications. HTTP is used for communication between applications and Twilio. Developers can program their phone number in wide range of languages.

The definition of ‘virtual’ is near and 'reality' is what we experience as human beings. So the term ‘virtual reality’ basically means ‘near-reality’. This could of course, mean anything but it usually refers to a specific type of reality emulation.
Everything that we know about our reality comes by way of our senses. Virtual reality is usually implemented using Computer Technology.

Applications

• Architecture
• Sport
• Medicine
• The Arts
• Entertainment

Features of Virtual Reality
There are many different types of virtual reality systems but they all share the same characteristics such as the ability to allow the person to view three-dimensional images. These images appear life-sized to the person. They change as the person moves around their environment which corresponds with the change in their field of vision. The aim is for seamless join between the person’s head and eye movements and the appropriate response, e.g. change in perception. This ensures that the virtual environment is both realistic and enjoyable.- Mr. G. Arun Kumar, Final Year/CSE

Deep Web and DarkNet

The Deep Web, Deepnet, Invisible Web, Hidden Web are search terms referring to the content that is not indexed by standard search engines. We all know only the things shown to us, i.e., called as “surface web” it is about 19 TB which is only a small part of the original world wide web. The greater part is hidden down with a size of about 7500 TB and guess what? It’s still expanding.

TORTOR stands for ‘The Onion Router’. As the name goes, it has many layers that you would have to penetrate to identify the users of it. Tor is a private network browser that allows anyone to access the universal internet without being traced. Tor does this by bouncing its communications between a network of computers, so that if a user is requesting data it will refer and pass the request to a series of computers to get the data and thus anyone will find it difficult finding the user viewing the web page or track the person using. In addition to this Tor provides a service called TOR secret service for the ones who wants to hide their locations like the same way it does to hide its location. These services are not shared and end by the address .onion and usually comprises of random characters for enhancing high security.
- Mr.S.Gowtham Sankar, 4th Year CSE

Congratulations!

Mr.G.Arun Kumar , Vuram Technologies.

Ms.S.Murugeswari, Xmplar, Bangalore.

Ms.C.Pavithra, Excelacom, Chennai Tech Mahindra

Mr.M.Sam Kirubaharan, Zentron Labs, Bangalore TCS, Chennai.

Congratulations!

Ms.V.Manjula , Quadrant4, Madurai.

Ms.S.Rashmitha Kanmani, Quadrant4, Madurai.

Mr.M.Mohammed Ashiff, Stutzen,Sivakasi.

Ms.P.Raja Priya, Stutzen,Sivakasi.

Congratulations!

Ms.P.Anusuya , Tech Mahindra.

Mr.K.Balaji, Tech Mahindra.

Ms.R.Rubhini , Tech Mahindra.

Ms.M.Devi Uma Sankari, Tech Mahindra.

Congratulations!

Ms.K.Dhanalakshmi , Tech Mahindra.

Ms.U.Grace Vincila Selin, Tech Mahindra.

Mr.T.K.V.Vikram, INPADEL,Bangalore.

Ms.N.Loga Surya, Tech Mahindra.

Ms.R.Rebekah Sherine, Tech Mahindra.

CSI Activities for Academic Year 2016-2017(odd)

A Guest Lecture on “Free and Open Source Software” by Dr.Sundara Kantham,AP/CSE, TCE on 30.07.2016 with 110 participants.

A Guest Lecture on “ Be a professional Engineer” by Dr. Emerson Raja,Professor, Faculty of Engineering and Technology at Multimedia University, Malaysia on 08.08.2016 with 156 participants.

CSI Activities for Academic Year 2016-2017(odd)

A Guest Lecture on “Polynomial Arithmetic and Finite Fields” by Mr. Gopinath, AP/Math on 12.08.2016 with 55 participants.

A Guest Lecture on “ERP” by R.Nishanthini, SAP consultant/Infosys, Alumni on 12.08.16 with 56 participants.

CSI Activities for Academic Year 2016-2017(odd)

A Guest Lecture on “Pipelining” by Dr.S.Padmavathi,ASP/CSE,TCE on 26.08.2016 with 100 participants.

A Guest Lecture on “Polynomial Arithmetic and Finite Fields ” by Dr.A.Maheswari , Department of Mathematics on 11-08-16 with 55 participants

Cyber heft Activities for Academic Year 2016-2017(odd)

A Guest Lecture on “Expectations of IT Industries ” by Mr. Siva Guru Trainee Engineer, Ramco Systems on 12-08-16 with 53 participants.

A Guest Lecture on "Cryptography and Network Security" by Dr. R. Rajaram, Dean, Vickram Engineering on 19-08-16 with 108 participants.

Cyber heft Activities for Academic Year 2016-2017(odd)

A Seminar on "Advanced Data Structures and Algorithms" on 20.08.16 by Dr.R.Nadarajan, Professor and Head , Dr.R.Anitha, Associate Professor Dr.B.Malar, Assistant Professor Department of Applied Mathematics and Computational Sciences PSG College of Technology with 110 participants

A Guest Lecture on the topic “Service Oriented Architecture” by Mrs .P .Antony Seba, Department of Information Technology on 12-09-16 with 53 participants.

A Guest Lecture on "Software testing" by Mr.Srinivasan Desikan,Vice President,Business operations and Author of Software testing books,Altisource on 24-09-16 with 110 participants.

Skill Development Programmes in "Data Science and Big Data Analytics" co-ordinate by Mrs.R.Saranya, AP/CSE and Mr.P.Sudhakar, AP/CSE are conducted in two batches, first batch (8.8.2016-12.08.2016), second batch (29.2.2016-2.09.2016). All the SIG members trained the students.

Batch

No.of Students

No.of Trainers

I

30

13

II

27

9

HIGHLIGHTS

One team has been selected in NASSCOM Competition and participated in second round.

In which one of the students U.Grace Vincelin Selin has been selected in “Quadrant 4” for the technical round as she had the knowledge of R and she has been called to chennai for the third round in R.

If you believe in yourself and have dedication and pride - and never quit, you'll be a winner. The price of victory is high but so are the rewards.

~Paul Bryant

Contributions and feedbacks can be sent to following mail:
cseplugin@kamarajengg.edu.in